{"id":"UBUNTU-CVE-2015-5309","details":"Integer overflow in the terminal emulator in PuTTY before 0.66 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via an ECH (erase characters) escape sequence with a large parameter value, which triggers a buffer underflow.","modified":"2025-07-16T08:18:03.938906Z","published":"2015-12-07T20:59:00Z","withdrawn":"2025-07-18T16:43:15Z","upstream":["CVE-2015-5309"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-5309"},{"type":"REPORT","url":"http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-ech-overflow.html"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2015-5309"}],"affected":[{"package":{"name":"putty","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/putty@0.66-1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.66-1"}]}],"versions":["0.65-2"],"ecosystem_specific":{"binaries":[{"binary_version":"0.66-1","binary_name":"pterm"},{"binary_version":"0.66-1","binary_name":"pterm-dbgsym"},{"binary_version":"0.66-1","binary_name":"putty"},{"binary_version":"0.66-1","binary_name":"putty-dbgsym"},{"binary_version":"0.66-1","binary_name":"putty-doc"},{"binary_version":"0.66-1","binary_name":"putty-tools"},{"binary_version":"0.66-1","binary_name":"putty-tools-dbgsym"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2015/UBUNTU-CVE-2015-5309.json"}}],"schema_version":"1.7.3","severity":[{"type":"Ubuntu","score":"medium"}]}